Articles

Linux – Multiple Choice Questions – MCQ – 151 to 180 Questions with Explanation

151. Which directive in the XF86Config file disables the Ctrl-Alt-Backspace key combination?

A. NoZap
B. DontZap
C. NoExit
D. DontExit

Answer – – B
Description – The other commands do not exist.

152. Which of the following XF86Config directives is required?

A. VendorName
B. ModelName
C. Identifier
D. Gamma

Answer – – C
Description – Identifier is referenced from the Screen section and is required. The other Answers are optional.

153. Which tool is used to detect most video hardware?

A. SuperProbe
B. xvidtune
C. XF86Setup
D. xf86config

Answer – – A
Description – SuperProbe will look for the video chipset type installed in the system. The other tools do not detect video hardware.

154. You would enter the _________________ command if you added fonts to the /sr/X11R6/lib/X11/fonts/myfonts directory.

Answer – – .mkfontdir /usr/X11R6/lib/X11/fonts/myfonts.
Description – The mkfontdir command must be run whenever new fonts are added to the system.

155. If a user wants an application to load when they run startx, they should put it in their _________ file.

Answer – – .xinitrc.
Description – This file is executed by xinit.

156. Which file must be changed to allow remote logins with XDM?

A. Xresources
B. Xsession
C. xdm-config
D. xdmrc

Answer – – C
Description – The xdm-config file must be changed to tell XDM to listen for queries.

157. Which file would you change to alter the text shown at the XDM login screen?

A. Xsession
B. Xresources
C. xdm-config
D. xdmrc

Answer – – B
Description – The XDM service uses an Xresources file to customize the login display.

158. Which parameter would you use to send the display output of an application to the second screen on the first display of the host named norbert?

A. -display norbert:1.2
B. -display norbert:2.1
C. -display norbert:0.1
D. -display norbert:1.0

Answer – – C
Description – Remember that the display and screen numbers start at 0, and the order is display first, then screen.

159. Which terminal emulator was designed to work with the Enlightenment window manager?

A. rxvt
B. aterm
C. xterm
D. Eterm

Answer – – D
Description – Eterm is the terminal emulator that goes with Enlightenment.

160. The __________ file stores a user’s personal changes to X applications written with the X Toolkit.

Answer – – .Xdefaults.
Description – This file holds Xresource entries that customize X apps for that user.

161. Which key combination returns the user to the X environment from a text console?

A. Ctrl-Alt-F7
B. Ctrl-Alt-Backspace
C. Ctrl-Alt-F6
D. Ctrl-Alt-+

Answer – – A
Description – Ctrl-Alt-F1 through Ctrl-Alt-F6 take you to various text consoles, and Ctrl-Alt-F7 brings you back to the X environment.

162. To allow the host dag to connect to your X server, you would enter the command _____________.

Answer – – xhost +dag.
Description – Host authentication is configured using the xhost command.

163. Which command would you use to quickly log into the system named norbert that is running XDM?

A. X -broadcast
B. X -indirect norbert
C. X -query norbert
D. startx -broadcast

Answer – – C
Description – This command connects directly to the specified system, without going through the chooser.

164. Which entry in the Xaccess file would block the host norbert from using the chooser?

A. norbert NOCHOOSER *
B. !norbert CHOOSER brain
C. -norbert CHOOSER brain
D. * NOCHOOSER brain

Answer – – B
Description – The ! at the beginning of the line is used to block hosts.

165. Which entry in the Xaccess file needs to be modified to enable remote login for XDM?

A. EnableRemote.Request 0
B. DisplayManager.Enable 0
C. DisplayManager.request 0
D. DisplayManager.requestport 0

Answer – – D
Description – The other options are invalid. Without changing this option XDM will not allow connections.

166. Which of the following is not stored in the /etc/passwd file?

A. Home directory path
B. Shell assignment
C. User ID
D. Quotas

Answer – – D
Description – Quota information is not stored in the /etc/passwd file.

167. When shadow passwords are enabled the password in the /etc/passwd file is displayed as ___________ .

Answer – – x
Description – Once shadow passwords are enabled the password field in the /etc/passwd file contains an x character to signify that the password is contained in the /etc/shadow file.

168. Files located in which file are copied to users’ home directories?

A. /etc/group
B. /etc/passwd
C. /etc/skel
D. /etc/user

Answer – – C
Description – Files stored in the /etc/skel directory are copied to users’ home directories.

169. Which option with the useradd command specifies that the home directory should be created if it doesn’t already exist?

A. -h
B. -m
C. -c
D. -d

Answer – – B
Description – The useradd –m command specifies that the home directory is to be created with the user account.

170. Which option is used with userdel to remove a user’s home directory as the account is removed?

A. -d
B. -h
C. -r
D. -e

Answer – – C
Description – The userdel –r command is used to remove a user’s home directory with the user account.

171. Which option with usermod is used to change a user’s default shell?

A. -d
B. -s
C. -b
D. -q

Answer – – B
Description – The usermod –s command is used to change a user’s default shell.

172. Global environment settings are configured in the __________ file.

Answer – – /etc/profile.
Description – Global environment settings are stored in the /etc/profile file.

173. The default umask used on the system is configured in which file?

A. /etc/bash
B. /etc/profile
C. /etc/passwd
D. /etc/files

Answer – – B
Description – The default umask used on the system is configured in the /etc/profile file.

174. Which type of access is granted to all users for the /etc/passwd file?

A. Read
B. Execute
C. No access
D. Write

Answer – – A
Description – All users are granted read access to the /etc/passwd file.

175. Which type of access is granted to other users for the /etc/shadow file?

A. Read
B. Execute
C. No access
D. Write

Answer – – C
Description – All users are granted no access to the /etc/shadow file.

176. Which command allows users to view their group memberships?

A. groupadd
B. newgroup
C. groups
D. newgrp

Answer – – C
Description – Users can view their group memberships using the groups command.

177. The ________ account has full control of the system.

Answer – – root
Description – The root account has full control of the system.

178. Which of the following will restart the crond daemon running as process id 446?

A. kill -9 446
B. kill -SIGHUP 446
C. kill -1 446
D. kill -SIGTERM 446
E. Answer’s A and D
F. Answer’s B and C
G. None of the above

Answer – – F
Description – The kill command can use signal names and numbers to stop, start, and restart processes.

179. Choose all of the correct facility names used in /etc/syslog.conf.

A. auth
B. access
C. authpriv
D. kern
E. panic
F. notice

Answer – – A,C and D
Description – auth, authpriv, and kern are all facility names used in /etc/syslog.conf.

180. Where are system startup scripts stored on a Red Hat–based system?

A. /etc
B. /etc/rc.d/rc3.d
C. /etc/init.d
D. /etc/rc.d/init.d

Answer – – D
Description – On Red Hat–based systems, system scripts are stored in /etc/rc.d/init.d.

For Linux MCQ 181 – 210 | Main Linux MCQ Page

Have something to say about this article? Comment below or share it with us on Facebook or Twitter.

H4ck0
Step by step hacking tutorials about wireless cracking, kali linux, metasploit, ethical hacking, seo tips and tricks, malware analysis and scanning.
https://www.yeahhub.com/

WHERE SHOULD WE SEND

HACKING TUTORIALS & INFOSEC NEWS?

Subscribe to Our Newsletter and Get Instant Delivered to Your Email Inbox.

We respect your privacy and take protecting it seriously.

Leave a Reply

Your email address will not be published. Required fields are marked *

ten + ten =